Conference / Journal:
  • [PDF] Shiqing Ma, Juan Zhai, Fei Wang, Kyu Hyung Lee, Xiangyu Zhang, Dongyan Xu. "MPI: Multiple Perspective Attack Investigation with Semantic Aware Execution Partitioning". In Proceedings of the 26th USENIX Security Symposium, 2017. Distinguished Paper Award
  • [PDF] Babak Rahbarinia, Marco Balduzzi, Roberto Perdisci. "Exploring the Long Tail of (Malicious) Software Downloads". IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2017
  • [PDF] Xingzi Yuan, Omid Setayeshfar, Hongfei Yan, Pranav Panage, Xuetao Wei, Kyu Hyung Lee, "DroidForensics: Accurate Reconstruction of Android Attacks via Multi-layer Forensic Logging". In ACM Asia Conference on Computer and Communications Security, AsiaCCS 2017.
  • [PDF] Phani Vadrebu, Jienan Liu, Bo Li, Babak Rahbarinia, Kyu Hyung Lee, and Roberto Perdisci. "Enabling reconstruction of attacks on users via efficient browsing snapshots". Proceedings of the Network and Distributed System Security Symposium, NDSS 2017.
  • [PDF] Yonghwi Kwon, Brendan Saltaformaggio, I Luk Kim, Kyu Hyung Lee, Xiangyu Zhang, Dongyan Xu. "A2C: Self Destructing Exploit Executions via Input Perturbation". Proceedings of the Network and Distributed System Security Symposium, NDSS 2017.
  • [link] Babak Rahbarinia, Roberto Perdisci, Manos Antonakakis. "Efficient and Accurate Behavior-Based Tracking of Malware-Control Domains in Large ISP Networks." ACM Transactions on Privacy and Security , Volume 19, Issue 2, Article No. 4, August 2016
  • [PDF] Jaewoo Lee and Daniel Kifer. "Postprocessing for Iterative Differentially Private Algorithms". In ICML 2016 Workshop on Theory and Practice of Differential Privacy, ICML, 2016 (poster)
  • [link] Monjur Alam, Zhe Cheng Lee, Chrysostomos Nicopoulos, Kyu Hyung Lee, Jongman Kim, Junghee Lee, "SBBox: A Tamper-Resistant Digital Archiving System". In International Journal of Cyber-Security and Digital Forensics (IJCSDF) 2016 Volume 5.
  • [PDF] Xuetao Wei, Michael Wolf, Lei Guo, Kyu Hyung Lee , Ming-Chun Huang, Chun Huang, Nan Niu. "emphaSSL: Towards Emphasis as a Mechanism to Harden Networking Security in Android Apps". IEEE GLOBECOM, 2016.
  • [PDF] Terry Nelms, Roberto Perdisci, Manos Antonakakis, and Mustaque Ahamad. "Towards measuring and mitigating social engineering software download attacks". In Proceedings of the 25th USENIX Security Symposium, 2016.
  • [PDF] Babak Rahbarinia, Marco Balduzzi, Roberto Perdisci. "Real-Time Detection of Malware Downloads via Large-Scale URL->File->Machine Graph Mining." ACM Symposium on InformAtion, Computer and Communications Security, AsiaCCS 2016.
  • [PDF] Phani Vadrevu, Roberto Perdisci. "MAXS: Scaling Malware Execution with Sequential Multi-Hypothesis Testing." ACM Symposium on InformAtion, Computer and Communications Security, AsiaCCS 2016.
  • [PDF] Jianjun Chen, Jian Jiang, Xiaofeng Zheng, Haixin Duan, Jinjin Liang, Kang Li, Tao Wan, and Vern Paxson. "Forwarding-Loop Attacks in Content Delivery Networks". Annual Network and Distributed System Security Symposium, NDSS 2016. Best Paper Award
  • [PDF] Yacin Nadji, Roberto Perdisci, Manos Antonakakis. "Still Beheading Hydras: Botnet Takedowns Then and Now." IEEE Transactions on Dependable and Secure Computing, (IEEE TDSC), 2015
  • [PDF] Shiqing Ma, Kyu Hyung Lee, Chung Hwan Kim, Junghwan Rhee, Xiangyu Zhang, Dongyan Xu. "Accurate, Low Cost and Instrumentation-Free Security Audit Logging for Windows". Annual Computer Security Applications Conference, ACSAC 2015.
  • [PDF] Christopher Neasbitt, Bo Li, Roberto Perdisci, Long Lu, Kapil Singh, and Kang Li. "WebCapsule: Towards a lightweight forensic engine for web browsers". Proceedings of the 22th ACM conference on Computer and communications security, CCS 2015.
  • [PDF] Terry Nelms, Roberto Perdisci, Manos Antonakakis, Mustaque Ahamad. "WebWitness: Investigating, Categorizing, and Mitigating Malware Download Paths." In Proceedings of the 24th USENIX Security Symposium, 2015.
  • [PDF] Jaewoo Lee, Yue Wang, and Daniel Kifer. "Maximum Likelihood Postprocessing for Differen- tial Privacy under Consistency Constraints". In Proceedings of the 21st ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD, 2015
  • [PDF] Maria Konte, Roberto Perdisci, Nick Feamster. "ASwatch: An AS Reputation System to Expose Bulletproof Hosting ASes." ACM SIGCOMM Computer Communication Review, Volume 45 Issue 4, October 2015 Pages 625-638
  • [PDF] Babak Rahbarinia, Roberto Perdisci, Manos Antonakakis. "Segugio: Efficient Behavior-Based Tracking of New Malware-Control Domains in Large ISP Networks." IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2015.
  • [PDF] Xinyu Xing, Wei Meng, Udi Weinsberg, Anmol Sheth, Byoungyoung Lee, Roberto Perdisci, Wenke Lee. "Understanding Malvertising Through Ad-Injecting Browser Extensions." International World Wide Web Conference, WWW 2015.
  • [PDF] Christopher Neasbitt, Roberto Perdisci, Kang Li, Terry Nelms. "ClickMiner: Towards Forensic Reconstruction of User-Browser Interactions from Network Traces." ACM Conference on Computer and Communications Security, ACM CCS 2014.
  • [PDF] Yizheng Chen, Manos Antonakakis, Roberto Perdisci, Yacin Nadji, David Dagon, Wenke Lee. "DNS Noise: Measuring the Pervasiveness of Disposable Domains in Modern DNS Traffic." IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2014.
  • [PDF] Jaewoo Lee and Chris Clifton. "Top-k Frequent Itemsets via Differentially Private FP-trees. In Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD, 2014
  • [PDF] Jinjing Liang, Jian Jiang, Haixin Duan, Kang Li, Tao Wan, and Jianping Wu. "When HTTPS Meets CDN: A Case of Authentication in Delegated Service". In Proceedings of 35th IEEE Symposium on Security and Privacy, S&P 2014.
  • [link] Babak Rahbarinia, Roberto Perdisci, Andrea Lanzi, and Kang Li. "PeerRush: Mining for unwanted P2P traffic." Journal of Information Security and Applications, Volume 19, Issue 3, July 2014, Pages 194-208.
  • [link] Junjie Zhang, Roberto Perdisci, Wenke Lee, Unum Sarfraz, and Xiapu Luo. "Building a scalable system for stealthy P2P-botnet detection". IEEE Transactions on Information Forensics and Security (IEEE-TIFS), 9(1):27-38, Jan. 2014.
  • [link] Roberto Perdisci, Davide Ariu, Giorgio Giacinto. "Scalable Fine-Grained Behavioral Clustering of HTTP-Based Malware." Computer Networks, Special Issue on Botnet Activity: Analysis, Detection and Shutdown, 57(2):487-500, 2013.
  • [PDF] Kyu Hyung Lee, Xiangyu Zhang and Dongyan Xu. "LogGC: Garbage Collectable Audit Log". 20th ACM Conference on Computer and Communications Security, ACM CCS 2013.
  • [PDF] Yacin Nadji, Manos Antonakakis, Roberto Perdisci, Wenke Lee, David Dagon. "Beheading Hydras: Performing Effective Botnet Takedowns." 20th ACM Conference on Computer and Communications Security, ACM CCS 2013.
  • [PDF] Phani Vadrevu, Babak Rahbarinia, Roberto Perdisci, Kang Li, Manos Antonakakis. "Measuring and Detecting Malware Downloads in Live Network Traffic." 18th European Symposium on Research in Computer Security, ESORICS 2013.
  • [PDF] Yacin Nadji, Manos Antonakakis, Roberto Perdisci, Wenke Lee. "Connected Colors: Unveiling the Structure of Criminal Networks." 16th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2013.
  • [PDF] Terry Nelms, Roberto Perdisci, Mustaque Ahamad. "ExecScent: Mining for New C&C Domains in Live Networks with Adaptive Control Protocol Templates." USENIX Security Symposium 2013.
  • [PDF] Babak Rahbarinia, Roberto Perdisci, Manos Antonakakis, David Dagon. "SinkMiner: Mining Botnet Sinkholes for Fun and Profit." 6th USENIX Workshop on Large-Scale Exploits and Emergent Threats, LEET 2013.
  • [PDF] Kyu Hyung Lee, Xiangyu Zhang and Dongyan Xu. "High Accuracy Attack Provenance via Binary-Based Execution Partition". Proceedings of the Network and Distributed System Security Symposium, NDSS 2013.
  • [PDF] Babak Rahbarinia, Roberto Perdisci, Andrea Lanzi, Kang Li. "PeerRush: Mining for Unwanted P2P Traffic". 10th Conference on Detection of Intrusions and Malware & Vulnerability Assessment, DIMVA 2013 Best Paper Award
Thesis / Dissertation:
  • [PDF] Zhenyu Zhong, PhD, "System Oriented Techniques For High-Performance Anti-spam Solutions", Graduated in Dec 15, 2007.
  • [PDF] Douglas Brewer, PhD, "Detecting Web Robots with Passive Behavioral Analysis and Forced Behavior", December 17, 2010.
  • [PDF] Enrico Galli, MS, "Reverse Engineering Android Applications", August 4, 2012
  • [PDF] I-Cheng Wang, MS, "Scalar-product based Secure Multi-party Computation", May 11, 2012.
  • [PDF] Farhan Jiva, MS, "Helping Johnny Pentest: Addressing the Shortcomings of Black-box Web Vulnerability Scanners", May 11, 2012.
  • [PDF] Yuchen Ying, MS, "unROP: Creating Correct Backtrace from Core Dumps with Stack Pivoting", August 1, 2014.
  • [PDF] Babak Rahbarinia, Ph.D., "Behavioral Analysis of Network Traffic for Detecting Advanced Cyber-threats", May 8, 2015.
  • [PDF] Christopher Neasbitt,  Ph.D., "Advancing Cyber Forensics via Record and Replay of User-Browser Interactions", December 18, 2015.